Publisher
Springer Science and Business Media LLC
Subject
Health Information Management,Health Informatics,Information Systems,Medicine (miscellaneous)
Reference18 articles.
1. Lamport, L., Password Authentication with Insecure Communication. Comm. ACM 24(11):770–772, 1981.
2. Juang, W.-S., Wu, J.-L., An efficient two-factor authenticated key exchange protocol based on elliptic curve cryptosystems. In Proc. of The 11th information management and implementation conference (IMI’05), pp. 299–306, 2005.
3. Mangipudi, K., Katti, R., A secure identification and key agreement protocol with user anonymity (SIKA). Comput. Secur, 25(6):420–425, 2006.
4. Lee, N.-Y., Wu, C.-N., Wang, C.-C., Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings. Comput. Electr. Eng. 34(1):12–20, 2008.
5. Yang, J.-H., Chang, C.-C., An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput. Secur. 28:138–143, 2009.
Cited by
149 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献